Описание
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to cause denial of service, gain privileges, obtain sensitive information, bypass security restrictions, execute arbitrary code.
Below is a complete list of vulnerabilities:
- A denial of service vulnerability in Windows TCP/IP can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
- An information disclosure vulnerability in DHCP Server Service can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows GDI can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows TCP/IP can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely to gain privileges.
- A denial of service vulnerability in DHCP Server Service can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Cloud Files Mini Filter Driver can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Microsoft Streaming Service Proxy can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Kernel can be exploited remotely to obtain sensitive information.
- A security feature bypass vulnerability in Windows MSHTML Platform can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in Windows Miracast Wireless Display can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Internet Connection Sharing (ICS) can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Themes can be exploited remotely to execute arbitrary code.
- A heap buffer overflow vulnerability in WebP can be exploited to cause denial of service.
Первичный источник обнаружения
- CVE-2023-38162
 CVE-2023-35355
 CVE-2023-38141
 CVE-2023-36802
 CVE-2023-36804
 CVE-2023-38160
 CVE-2023-38143
 CVE-2023-38144
 CVE-2023-38150
 CVE-2023-38152
 CVE-2023-38142
 CVE-2023-38149
 CVE-2023-36803
 CVE-2023-36805
 CVE-2023-38140
 CVE-2023-38147
 CVE-2023-36801
 CVE-2023-38148
 CVE-2023-38146
 CVE-2023-38161
 CVE-2023-38139
 CVE-2023-4863
Эксплуатация
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Связанные продукты
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-Server-2012
- Microsoft-Windows-10
- Microsoft-Windows-Server-2016
- Microsoft-Windows-Server-2019
- Microsoft-Windows-11
Список CVE
- CVE-2023-4863 critical
- CVE-2023-38149 critical
- CVE-2023-38141 critical
- CVE-2023-36801 high
- CVE-2023-36804 critical
- CVE-2023-38160 high
- CVE-2023-38143 critical
- CVE-2023-38144 critical
- CVE-2023-38152 high
- CVE-2023-38161 critical
- CVE-2023-38142 critical
- CVE-2023-38139 critical
- CVE-2023-38162 critical
- CVE-2023-35355 critical
- CVE-2023-36802 critical
- CVE-2023-38150 critical
- CVE-2023-36803 high
- CVE-2023-36805 high
- CVE-2023-38140 high
- CVE-2023-38147 critical
- CVE-2023-38148 critical
- CVE-2023-38146 critical
Список KB
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
                                    Нашли неточность в описании этой уязвимости? Дайте нам знать!